exploits
- APPLICATIONS
DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints
The threat actors behind the DragonForce ransomware gained access to an unnamed Managed Service Provider’s (MSP) SimpleHelp remote monitoring and…
Read More » - APPLICATIONS
Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations
May 29, 2025Ravie LakshmananMalware / Cloud Security Google on Wednesday disclosed that the Chinese state-sponsored threat actor known as APT41…
Read More » - APPLICATIONS
Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
May 20, 2025Ravie LakshmananMalware / Cloud Security A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud…
Read More » - APPLICATIONS
Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More
May 19, 2025Ravie LakshmananThreat Intelligence / Cybersecurity Cybersecurity leaders aren’t just dealing with attacks—they’re also protecting trust, keeping systems running,…
Read More » - APPLICATIONS
Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams
May 12, 2025Ravie LakshmananCybersecurity / Hacking News What do a source code editor, a smart billboard, and a web server…
Read More » - APPLICATIONS
Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT
May 08, 2025Ravie LakshmananVulnerability / Network Security Cisco has released software fixes to address a maximum-severity security flaw in its…
Read More » - APPLICATIONS
OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws
May 07, 2025Ravie LakshmananVulnerability / Web Security A second security flaw impacting the OttoKit (formerly SureTriggers) WordPress plugin has come…
Read More » - APPLICATIONS
Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals
Apr 22, 2025Ravie LakshmananIoT Security / Malware Cybersecurity researchers have detailed a malware campaign that’s targeting Docker environments with a…
Read More » - APPLICATIONS
Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan
Apr 21, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have flagged a new malicious campaign related to the North Korean state-sponsored…
Read More » - APPLICATIONS
iOS Zero-Days, 4Chan Breach, NTLM Exploits, WhatsApp Spyware & More
Apr 21, 2025Ravie LakshmananCybersecurity / Hacking News Can a harmless click really lead to a full-blown cyberattack? Surprisingly, yes —…
Read More »